Monday, 21 May 2012

CCNA 1ST MODULE QUESTION & ANSWER


1 Which transport layer protocol provides low overhead and would be used for applications which do not require reliable data delivery?
TCP
IP
UDP
HTTP
DNS

2  What are two features of the User Datagram Protocol (UDP)? (Choose two.)
flow control
low overhead
connectionless
connection-oriented
sequence and acknowledgements

3  What mechanism is used by TCP to provide flow control as segments travel from source to destination?
sequence numbers
session establishment
window size
acknowledgments

4 What is dynamically selected by the source host when forwarding data?
destination logical address
source physical address
default gateway address
source port

5  Why are port numbers included in the TCP header of a segment?
to indicate the correct router interface that should be used to forward a segment
to identify which switch ports should receive or forward the segment
to determine which Layer 3 protocol should be used to encapsulate the data
to enable a receiving host to forward the data to the appropriate application
to allow the receiving host to assemble the packet in the proper order

6  Which two options represent Layer 4 addressing? (Choose two.)
identifies the destination network
identifies source and destination hosts
identifies the communicating applications
identifies multiple conversations between the hosts
identifies the devices communicating over the local media

7  Which three features allow TCP to reliably and accurately track the transmission of data from source to destination?
encapsulation
flow control
connectionless services
session establishment
numbering and sequencing
best effort delivery

8  Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately?
application
presentation
session
transport
network

9 Which event occurs during the transport layer three-way handshake?
The two applications exchange data.
TCP initializes the sequence numbers for the sessions.
UDP establishes the maximum number of bytes to be sent.
The server acknowledges the bytes of data received from the client.

 
10 Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result?
create a Layer 1 jam signal
reach a timeout and resend the data that needs to be acknowledged
send a RESET bit to the host
change the window size in the Layer 4 header.

 
11 Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?
Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2.
Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1.





12 Both switches and hubs are being utilized within the TestKing network. Which of the following is true regarding the use of switches and hubs for network connectivity in this network?
A. Switches take less time to process frames than hubs take
B. Hubs can filter frames
C. Switches do not forward broadcasts
D. Switches increase the number of collision domains in the network
E. Using hubs can increase the amount of bandwidth available to hosts
F. None of the above.

13 Which one of the following characteristics is true regarding the use of hubs and switches?
A. Hubs can have their ports be configured with VLANs
B. Using hubs is costly with regard to bandwidth availability.
C. Switches can not forward broadcasts
D. Switches are more efficient than hubs in processing frames.
E. Switches increase the number of collision domains in the network

14 When comparing and contrasting the similarities and differences between bridges and switches, which of the following are valid statements? Choose all the valid answer choices)
A. Bridges are faster than switches because they have fewer ports.
B. A switch is a multiport bridge,
C. Bridges and switches learn MAC addresses by examining the source MAC address of
each frame received.
D. A bridge will forward a broadcast but a switch will not.
E. Bridges and switches increase the size of a collision domain.
F. None of the above statements are true.

15 Which of the following correctly describe the various functions and virtues of a router? (Select all valid answer choices)
A. Packet switching
B. Collision prevention on a LAN segment.
C. Packet filtering
D. Broadcast domain enlargement
E. Broadcast forwarding
F. Internetwork communication
G. None of the above



16 The LAN needs are expanding at the Testking corporate office, which is quickly growing You are instructed to enlarge the area covered by a single LAN segment on the company network. Which of the following are layer 1 devices that you can use? (Choose all that apply.)
A. A switch
B. A router
C. A network adapter card
D. A hub
E. A repeater


17 Cisco is the leader in the router market space. What basic functions do their routers perform in a network? (Choose two)
A. The microsegmentation of broadcast domains
B. Path selection
C. Packet switching
D. Bridging between LAN segments
E. Access layer security
F. VLAN membership assignment
G. Application optimization


18 Both bridges are switches are being used throughout the TestKing LAN. Which of the following statements are true regarding bridges and switches in this network? (Choose 3)
A. Switches are primarily software based while bridges are hardware based.
B. Switches usually have a higher number of ports than most bridges.
C. Bridges are frequently faster than switches.
D. Bridges define broadcast domains while switches define collision domains.
E. Both bridges and switches forward Layer 2 broadcasts.
F. Both bridges and switches make forwarding decisions based on Layer 2 addresses


19 As a network administrator, you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of devices in a WAN? (Choose three)
A. A CSU/DSU terminates a digital local loop.
B. A router is commonly considered a DCE device.
C. A modem terminates an analog local loop.
D. A router is commonly considered a DTE device.
E. A modem terminates a digital local loop.

20 As a CCNA candidate, you must know the various layers of the OSI model. At which layers of the OSI Model do Wide Area Networks operate in? (Choose two)
A. Physical Layer
B. Datalink Layer
C. Network Layer
D. Session Layer
E. Transport Layer
F. Presentation Layer
G. Application Layer

21 While troubleshooting a connectivity problem on the network, you issue the ping command from your PC command prompt, but the output shows "request times out." At which OSI layer is this problem associated with?
A. The data link layer
B. The application layer
C. The access layer
D. The session layer
E. The network layer

22 You download a file from an FTP site on the Internet. What is the highest layer in the OSI model used in this FTP operation?
A. Application
B. Presentation
C. Session
D. Transport
E. Internet
F. Data Link
G. Physical

23 A host computer has been correctly configured with a static IP address, but the default gateway is incorrectly set. Which layer of the OSI model will be first affected by this configuration error?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
E. Layer 7

24 Which layer of the OSI reference model is responsible for ensuring reliable end-to-end delivery of data?
A. Application
B. Presentation
C. Session
D. Transport
E. Network
F. Data-Link

25 At which OSI layer is a logical path created between two host systems named TK1 and TK2 on the company LAN?
A. Physical
B. Session
C. Data link
D. Transport
E. Network
F. Application
G. Presentation

26 Which OSI layer is associated with the following: The acknowledgement of transmissions, sequencing, and flow control across a network?
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
E. Layer 6
F. Layer 7

27 Which OSI layer header contains the address of a destination host that is on another network?
A. Application
B. Presentation
C. Session
D. Transport
E. Network
F. Data link
G. Physical

28 Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two)
A. The presentation layer translates bits into voltages for transmission across the physical
link.
B. The transport layer divides a data stream into segments and adds reliability and flow control information.
C. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
D. The data link layer adds physical source and destination addresses and an FCS to the
segment.
E. Packets are created when the network layer encapsulates a frame with source and
destination host addresses and protocol-related control information.


29 When files are transferred between a host and an FTP server, the data is divided into smaller pieces for transmission. As these pieces arrive at the destination host, they must be reassembled to reconstruct the original file. What provides for the reassembly of these pieces into the correct order?
A. The sequence number in the TCP header
B. The Start Frame Delimiter in the 802.3 Preamble
C. The TTL in the IP header
D. The acknowledgement number in the segment header
E. The frame check sequence in the Ethernet frame trailer


30 Refer to the exhibit. Which statement describes the media access control methods that are used by the networks in the exhibit?
 All three networks use CSMA/CA
None of the networks require media access control.
Network 1 uses CSMA/CD and Network 3 uses CSMA/CA.
Network 1 uses CSMA/CA and Network 2 uses CSMA/CD.
Network 2 uses CSMA/CA and Network 3 uses CSMA/CD.



31 Which options are properties of contention-based media access for a shared media? (Choose three.)
non-deterministic
less overhead
one station transmits at a time
collisions exist
devices must wait their turn
token passing


32  What is a primary purpose of encapsulating packets into frames?
provide routes across the internetwork
format the data for presentation to the use
facilitate the entry and exit of data on media
identify the services to which transported data is associated

33 What is true concerning physical and logical topologies?
The logical topology is always the same as the physical topology.
Physical topologies are concerned with how a network transfers frames.
Physical signal paths are defined by Data Link layer protocols.
Logical topologies consist of virtual connections between nodes.

34  What are three characteristics of valid Ethernet Layer 2 addresses? (Choose three.)
They are 48 binary bits in length.
They are considered physical addresses.
They are generally represented in hexadecimal format.
They consist of four eight-bit octets of binary numbers.
They are used to determine the data path through the network.
They must be changed when an Ethernet device is added or moved within the network.

35 What determines the method of media access control? (Choose two.)
network layer addressing
media sharing
application processes
logical topology
intermediary device function

36 What is the purpose of the preamble in an Ethernet frame?
is used as a pad for data
identifies the source address
identifies the destination address
marks the end of timing information
is used for timing synchronization with alternating patterns of ones and zeros

37 What statements are true regarding addresses found at each layer of the OSI model? (Choose two.)
Layer 2 may identify devices by a physical address burned into the network card
Layer 2 identifies the applications that are communicating
Layer 3 represents a hierarchical addressing scheme
Layer 4 directs communication to the proper destination network
Layer 4 addresses are used by intermediary devices to forward data

38 Which statements describe the logical token-passing topology? (Choose two.)
Network usage is on a first come, first serve basis.
Computers are allowed to transmit data only when they possess a token.
Data from a host is received by all other hosts.
Electronic tokens are passed sequentially to each other.
Token passing networks have problems with high collision rates.

39 Which sublayer of the data link layer prepares a signal to be transmitted at the physical layer?
LLC
MAC
HDLC
NIC
 
40 What is true regarding media access control? (Choose three.)
Ethernet utilizes CSMA/CD
defined as placement of data frames on the media
contention-based access is also known as deterministin
802.11 utilizes CSMA/CD
Data Link layer protocols define the rules for access to different media
controlled access contains data collisions

41 What is a characteristic of a logical point-to-point topology?
The nodes are physically connected.
The physical arrangement of the nodes is restricted.
The media access control protocol can be very simple.
The data link layer protocol used over the link requires a large frame header.

42 What two facts are true when a device is moved from one network or subnet to another? (Choose two.)
The Layer 2 address must be reassigned.
The default gateway address should not be changed.
The device will still operate at the same Layer 2 address.
Applications and services will need additional port numbers assigned.
The Layer 3 address must be reassigned to allow communications to the new network.

43 What is a function of the data link layer?
provides the formatting of data
provides end-to-end delivery of data between hosts
provides delivery of data between two applications
provides for the exchange data over a common local media

44 Which three factors should be considered when implementing a Layer 2 protocol in a network? (Choose three.)
the Layer 3 protocol selected
the geographic scope of the network
the PDU defined by the transport layer
the physical layer implementation
the number of hosts to be interconnected

45 What is the primary purpose of the trailer in a data link layer frame?
define the logical topology
provide media access control
support frame error detection
carry routing information for the frame

46 A network administrator has been asked to provide a graphic representation of exactly where the company network wiring and equipment are located in the building. What is this type of drawing?
logical topology
physical topology
cable path
wiring grid
access topology

47 How many bits make up an IPv4 address?
128
64
48
32

48 In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?
destination network address
source network address
source MAC address
well known port destination address

49 What information is added during encapsulation at OSI Layer 3?
source and destination MAC
source and destination application protocol
source and destination port number
source and destination IP address


50 In a connectionless system, which of the following is correct?
The destination is contacted before a packet is sent.
The destination is not contacted before a packet is sent.
The destination sends an acknowledgement to the source that indicates the packet was received.
The destination sends an acknowledgement to the source that requests the next packet to be sent.